{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:01:56Z","timestamp":1776096116250,"version":"3.50.1"},"reference-count":69,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T00:00:00Z","timestamp":1430265600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1018302"],"award-info":[{"award-number":["CNS-1018302"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Asso for Info Science &amp; Tech"],"published-print":{"date-parts":[[2016,6]]},"abstract":"<jats:p>The increasing popularity of the Internet and social media is creating new and unique challenges for parents and adolescents regarding the boundaries between parental control and adolescent autonomy in virtual spaces. Drawing on developmental psychology and <jats:styled-content style=\"fixed-case\">C<\/jats:styled-content>ommunication <jats:styled-content style=\"fixed-case\">P<\/jats:styled-content>rivacy <jats:styled-content style=\"fixed-case\">M<\/jats:styled-content>anagement (<jats:styled-content style=\"fixed-case\">CPM<\/jats:styled-content>) theory, we conduct a qualitative study to examine the challenge between parental concern for adolescent online safety and teens' desire to independently regulate their own online experiences. Analysis of 12 parent\u2013teen pairs revealed five distinct challenges: (a) increased teen autonomy and decreased parental control resulting from teens' direct and unmediated access to virtual spaces, (b) the shift in power to teens who are often more knowledgeable about online spaces and technology, (c) the use of physical boundaries by parents as a means to control virtual spaces, (d) an increase in indirect boundary control strategies such as covert monitoring, and (e) the blurring of lines in virtual spaces between parents' teens and teens' friends.<\/jats:p>","DOI":"10.1002\/asi.23450","type":"journal-article","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T07:55:23Z","timestamp":1430294123000},"page":"1384-1403","source":"Crossref","is-referenced-by-count":83,"title":["The boundaries between: Parental involvement in a teen's online world"],"prefix":"10.1002","volume":"67","author":[{"given":"Lee B.","family":"Erickson","sequence":"first","affiliation":[{"name":"College of Information Sciences and Technology The Pennsylvania State University  102F IST Building University Park PA 16802"}]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology The Pennsylvania State University  316A IST Building University Park PA 16802"}]},{"given":"Heng","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology The Pennsylvania State University  307C IST Building University Park PA 16802"}]},{"given":"John M.","family":"Carroll","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology The Pennsylvania State University  307H IST Building University Park PA 16802"}]},{"given":"Mary Beth","family":"Rosson","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, College of Information Sciences and Technology  332G IST Building University Park PA 16802"}]},{"given":"Daniel F.","family":"Perkins","sequence":"additional","affiliation":[{"name":"Department of Agricultural Economics, Sociology and Education The Pennsylvania State University  107 Ferguson Building University Park PA 16802"}]}],"member":"311","published-online":{"date-parts":[[2015,4,29]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"crossref","unstructured":"Agosto D. &Abbas J.(2010).High school seniors' social network and other ICT preferences and concerns. Paper presented at the ASIS&T 2010.","DOI":"10.1002\/meet.14504701025"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22612"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21540"},{"key":"e_1_2_8_5_1","unstructured":"Albert C. &Salam A.(2012).Protecting children online: Exploring the impact of an online identifier for registered sex offenders on adult internet users' online information sharing behaviors. Paper presented at the AMCIS 2012 Proceedings Seattle WA."},{"key":"e_1_2_8_6_1","first-page":"3","volume-title":"Man\u2010Environment interactions: Evaluations and applications: Part 2","author":"Altman I.","year":"1974"},{"key":"e_1_2_8_7_1","volume-title":"The environment and social behavior: Privacy, personal space, territory, and crowding","author":"Altman I.","year":"1975"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/001391657600800102"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"e_1_2_8_10_1","volume-title":"The online generation gap. Contrasting attitudes and behaviors of parents and teens","author":"Associates H.R.","year":"2012"},{"key":"e_1_2_8_11_1","unstructured":"Bartlett L.(2007).Bullies in cyberspace spark growing concern. Space Daily."},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/cd.23219873706"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/cd.128"},{"key":"e_1_2_8_14_1","first-page":"119","volume-title":"Youth, identity, and DIGITAL media","author":"boyd d.","year":"2007"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084416"},{"key":"e_1_2_8_16_1","volume-title":"It's complicated: The social lives of networked teens","author":"boyd d.","year":"2014"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/yd.142"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_8_19_1","unstructured":"Burke M. Adamic L.A. &Marciniak K.(2013).Families on Facebook. Paper presented at the the Seventh International AAAI Conference on Weblogs and Social Media Palo Alto CA."},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/15267431.2012.742089"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21122"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.05.009"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.004"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0743554897122003"},{"key":"e_1_2_8_25_1","unstructured":"Cranor L. Durity A.L. Marsh A. &Ur B.(2014).Parents' and teens' perspectives on privacy in a technology\u2010filled world. Paper presented at the Symposium on Usable Privacy and Security (SOUPS) Menlo Park CA."},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837130"},{"key":"e_1_2_8_27_1","unstructured":"De Souza Z. &Dick G.N.(2008).Information disclosure by children in social networking\u2014And what do the parents know?Paper presented at the AMCIS 2008 Proceedings."},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.010"},{"key":"e_1_2_8_29_1","unstructured":"Defalco B.(2005).Teen convicted under Internet piracy law. Retrieved fromhttp:\/\/www.usatoday.com\/tech\/news\/techpolicy\/2005\u201003\u201007\u2010az\u2010teen\u2010downloader\u2010convicted_x.htm"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014069926507"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/00909880216574"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148742"},{"key":"e_1_2_8_35_1","first-page":"105","volume-title":"Handbook of qualitative research","author":"Guba E.E.","year":"1994"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X05279903"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/0272431608317611"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.2307\/249410"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.10.010"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_2_8_41_1","unstructured":"Lenhart A.(2005).Protecting teens online. Retrieved fromhttp:\/\/www.pewinternet.org\/files\/old\u2010media\/\/Files\/Reports\/2005\/PIP_Filters_Report.pdf.pdf"},{"key":"e_1_2_8_42_1","unstructured":"Lenhart A. &Madden M.(2007).Teens privacy & online social networks. PEW Internet & American Life Project. Retrieved fromhttp:\/\/www.pewinternet.org\/ppf\/r\/211\/report_display.asp"},{"key":"e_1_2_8_43_1","volume-title":"Teenage life online: The rise of the instant\u2010message generation and the Internet's impact on friendships and family relationships","author":"Lenhart A.","year":"2001"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811410406"},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808089415"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838150802437396"},{"key":"e_1_2_8_47_1","volume-title":"Towards a better Internet for children: Findings and recommendations from EU Kids Online to inform the CEO coalition","author":"Livingstone S.","year":"2012"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2008.04.004"},{"key":"e_1_2_8_49_1","unstructured":"Madden M. Lenhart A. Duggan M. Cortesi S. &Gasser U.(2013).Teens and technology 2013. Pew Internet."},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/019251398019001006"},{"key":"e_1_2_8_51_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2009.0068"},{"key":"e_1_2_8_52_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781036208417"},{"key":"e_1_2_8_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.11.001"},{"key":"e_1_2_8_54_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315807010-10"},{"key":"e_1_2_8_55_1","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"e_1_2_8_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2589.2010.00052.x"},{"key":"e_1_2_8_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/15267431.2013.743426"},{"key":"e_1_2_8_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22816"},{"key":"e_1_2_8_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.005"},{"key":"e_1_2_8_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732135"},{"key":"e_1_2_8_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812440160"},{"key":"e_1_2_8_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180802635455"},{"key":"e_1_2_8_63_1","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Strauss A.","year":"1990"},{"key":"e_1_2_8_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/0192513X05283095"},{"key":"e_1_2_8_65_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250979"},{"key":"e_1_2_8_66_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1995.9"},{"key":"e_1_2_8_67_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X02250056"},{"key":"e_1_2_8_68_1","doi-asserted-by":"crossref","unstructured":"Wisniewski P. Xu H. Rosson M.B. &Carroll J.M.(2014).Adolescent online safety: The \u201cmoral\u201d of the story. Paper presented at the CSCW 2014 Baltimore MD.","DOI":"10.1145\/2531602.2531696"},{"issue":"1","key":"e_1_2_8_69_1","article-title":"The problem\u2010centered interview","volume":"1","author":"Witzel A.","year":"2000","journal-title":"Forum Qualitative Sozialforschung \/ Forum: Qualitative Social Research"},{"key":"e_1_2_8_70_1","unstructured":"Yardi S.A.(2012).Social media at the boundaries: Supporting parents in managing youth's social media use. Unpublished dissertation. Georgia Institute of Technology Atlanta GA."}],"container-title":["Journal of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.23450","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.23450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.23450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T19:29:05Z","timestamp":1759951745000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.23450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,29]]},"references-count":69,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1002\/asi.23450"],"URL":"https:\/\/doi.org\/10.1002\/asi.23450","archive":["Portico"],"relation":{},"ISSN":["2330-1635","2330-1643"],"issn-type":[{"value":"2330-1635","type":"print"},{"value":"2330-1643","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,29]]}}}